cc/td/doc/product/aggr/vpn5000/5000sw/conc52x
hometocprevnextglossaryfeedbacksearchhelp
PDF

Table of Contents

Example Configurations

Example Configurations

This chapter includes sample configurations. The configuration is in the text file format, with section heads in brackets. See the "Copying a Text Configuration File" section and the "Text File Formatting" section for more information about text configurations.

Remote Users, Offices, and a Central Site

The following example shows the VPN 5001 concentrator at the central site with remote users and remote offices connecting over the Internet. A larger remote office includes a VPN 5001 concentrator that connects to the central site over the internet using a LAN-to-LAN tunnel. Authentication is done using a SecurID system and a VPN User list.


Figure 13-1: Enterprise Network


VPN 5001 Concentrator at the Central Site

[ General ]
Password                 = mypassword
DeviceName               = mydevice
IPsecGateway             = 136.5.5.2
 
[IP Ethernet 0]
mode                     = Routed
IPAddress                = 10.1.1.1
SubnetMask               = 255.255.255.0
RIPVersion               = V2
 
[ IP Ethernet 1]
mode                     = Routed
IPAddress                = 136.5.5.1
SubnetMask               = 255.255.255.0
[ IKE POLICY ]
Protection               = MD5_DES_G1
 
[ Logging ]
Level                    = Debug
LogToAuxPort             = On
 
[ Domain Name Server ]
PrimaryServer            = 10.1.1.3
 
[ Time Server ]
Enabled                  = On
ServerAddress            = 10.1.1.4
Adjust                   = -480
 
[ Appletalk Default ]
# Default sets the value for all ports unless
# otherwise specified.
mode                     = off
 
[ IPX Default ]
mode                     = off
 
[ IP Static ]
0.0.0.0 0.0.0.0 10.1.1.2 1
 
[ Tunnel Partner VPN 1 ]
Partner                  = 215.67.89.2
BindTo                   = Ethernet 1
SharedKey                = Mysecret
 
[ IP VPN 1 ]
mode                     = routed
RIPVersion               = V2
Numbered                 = Off
 
[ VPN Group "SmallRemoteOffice" ]
Transform                = esp(3des,md5)
LocalIPNet               = 10.1.2.0/24
ipnet                    = 10.1.1.0/24
SecurIDRequired          = On
 
[ VPN Group "RemoteUsers" ]
Transform                = esp(3des,md5)
LocalIPNet               = 10.1.3.0/24
ipnet                    = 10.1.1.0/24
SecurIDRequired          = On
 
[ SecurID ]
Enabled                  = On
PrimAddress              = SecurID.company.com
BindTo                   = Ethernet 0
 
[ VPN Users ]
#Use a single user name for each group to assign
#the group name.
AUser Config="SmallRemoteOffice"  SharedKey="Amykey1"
BUser Config="RemoteUsers"  SharedKey="Bmykey1"

VPN 5001 Concentrator at the Large Remote Office

[ General ]
Password                 = mypassword
DeviceName               = mydevice
 
[IP Ethernet 0]
mode                     = Routed
IPAddress                = 215.67.89.2
SubnetMask               = 255.255.255.0
RIPVersion               = V2
 
[ IP Ethernet 1 ]
mode                     = Off
 
[ IKE POLICY ]
Protection               = MD5_DES_G1
 
[ Logging ]
Level                    = Debug
LogToAuxPort             = On
 
[ Appletalk Default ]
# Default sets the value for all ports unless
# otherwise specified.
mode                     = off
 
[ IPX Default ]
mode                     = off
 
[ IP Static ]
0.0.0.0 0.0.0.0 215.67.89.1 1
 
[ Tunnel Partner VPN 1 ]
Partner                  = 136.5.5.1
BindTo                   = Ethernet 0
SharedKey                = Mysecret
 
[ IP VPN 1 ]
mode                     = routed
RIPVersion               = V2
Numbered                 = Off

Interoperating with an IOS Device

The following example shows a LAN-to-LAN tunnel connecting Sites A and B over the Internet. Site A uses a VPN 5001 concentrator while Site B uses a Cisco IOS device that supports IPsec.


VPN 5001 Concentrator

[ General ]
IPSecGateway             = 210.30.1.1
 
[ IP Ethernet 0 ]
Mode                     = Routed
SubnetMask               = 255.255.255.0
IPAddress                = 192.168.1.5
 
[ IP Ethernet 1 ]
SubnetMask               = 255.255.255.0
IPAddress                = 210.30.1.5
Mode                     = Routed
 
[ IKE Policy ]
# This value must match the IOS crypto isakmp policy command for hash
# (md5 or sha). IOS uses DES and G1 by default.
Protection               = MD5_DES_G1
 
[ IP Static ]
0.0.0.0 0.0.0.0 210.30.1.1 1
 
[ Tunnel Partner VPN 1 ]
BindTo                   = Ethernet 1
Peer                     = 192.168.3.0/24
# The Transform keyword must match a transform in the IOS 
# crypto ipsec transform-set command.
Transform                = esp(md5,des)
SharedKey                = "letmein"
Mode                     = Main
KeyManage                = Auto
LocalAccess              = 192.168.1.0/24
Partner                  = 210.30.2.5
 
[ IP VPN 1 ]
Numbered                 = Off
Mode                     = Routed

Cisco IOS Device

The following example shows the output of the more command. See the VPN 5002 configuration for comments about values that must match between the two devices.

version 12.1
service timestamps debug uptime
service timestamps log uptime
no service password-encryption
!
hostname cisco-3640
!
enable password letmein
!
!
!
!
!
ip subnet-zero
ip cef
no ip domain-lookup
!
ip audit notify log
ip audit po max-events 100
!
!
crypto isakmp policy 1
 hash md5
 authentication pre-share
crypto isakmp key letmein address 210.30.1.5
!
!
crypto ipsec transform-set compatible esp-des esp-md5-hmac
!
crypto map compatible-crypt 1 ipsec-isakmp
 set peer 210.30.1.5
 set transform-set compatible
 match address 101
!
!
!
!
!
!
!
!
interface FastEthernet0/0
 ip address 210.30.2.5 255.255.255.0
 duplex auto
 speed auto
 crypto map compatible-crypt
!
interface FastEthernet0/1
 ip address 192.168.3.5 255.255.255.0
 duplex auto
 speed auto
!
ip classless
ip route 0.0.0.0 0.0.0.0 210.30.2.1
no ip http server
!
access-list 101 permit ip 192.168.3.0 0.0.0.255 192.168.1.0 0.0.0.255
tftp-server slot0
tftp-server system
!
line con 0
 transport input none
line aux 0
line vty 0 4
 password letmein
 login
!
end
 

hometocprevnextglossaryfeedbacksearchhelp
Posted: Wed Sep 27 10:21:47 PDT 2000
Copyright 1989-2000©Cisco Systems Inc.